Selective Insurance Social
  • Business
  • Auto
  • Home
  • Digital Toolbox
    • LinkedIn Best Practices
  • Flood
    • Hurricane Preparedness
  • Infographics
  • Prep Guides
    • Coronavirus Information
    • Spring Maintenance Guide
    • Fire Prevention & Safety
    • Winter Preparation For Your Home
    • Winter Preparation For Your Business
    • Winter Preparation For Your Vehicle
    • Hurricane Preparation

Are You Your Own Worst Privacy Threat?

11/2/2017

 
Share this article:
When it comes to IT safety and security, are you your own worst enemy?
When individuals and business owners think about security risks, many envision major attacks organized by bands of experienced hackers. But breaches often begin at home. Simple mistakes, as non-threatening as they may seem, can leave your private information open and exposed.

When it comes to IT safety and security, are you your own worst enemy? Here are four areas where you might be taking risks to your privacy or the privacy of your small business data, and tips to lower your risk of a breach:
 
Public Wi-Fi Usage
If you've ever hit the café or coffee shop to get some work done, you've probably used a public Wi-Fi network at one point or another. It probably seemed harmless – after all, everyone does it. But in reality, an unsecured network can be a big security problem.

Unlike a secure portal in which credentials are needed to log in, a public network has no protection whatsoever. That gives hackers an easy way to stand between you and the connection point. Additionally, hackers can transfer malware over such a connection, infecting your computer without your knowledge.

A few simple safety measures can make it easier for you to stay safe. Use of VPN and SSL connections, for example, reduces your chances of being a target.

Unsecured Email Accounts
You may understand the differences between secured and unsecured web access, but did you know that email can be unsecured too? It's true – some email programs don't take action to secure the transmission of an email from one server to another.

Sending an email isn't quite as direct as the process may imply. To reach another individual, emails make four stops: your computer, your server, the recipient's server, and the recipient's computer. Each of these points can be an area of vulnerability. And while the recipient's email setup is likely out of your control, it still can create a risk for you.
​
Most business emails use SSL or TLS encryptions to avoid easy access from hackers. While most email providers, like Gmail, take these steps now, not all public providers do. Check your email provider to ensure they take these steps.

Autosaved Information
Autosaving information such as user IDs and passwords is often seen as more of a convenience than a threat. Unfortunately, this can be risky.

Allowing usernames, passwords and personal information to “autofill” in forms and login screens is certainly easier than typing everything fresh. But it's also opening the door to unscrupulous individuals. Anyone who uses or steals your device has instant access to your accounts. That includes hackers who can take control of your computer remotely over the internet.

Geotagging
Did you know that every photo you take on your smartphone has location data embedded into it? While this may not seem like a big deal, it can pose significant threats, especially when you share images on your social media pages or website. Anyone who knows how to read this data can ascertain where you are at any given time, opening yourself up to stalking or theft. To stay safe, turn this feature off in your phone's settings when you are not using it.
​Tips to Keep Yourself and Your Data Protected
​

Attempting to adhere to best practices on the internet may seem like a losing battle. But there are steps you can take to enhance security for you and your small business.

Consider these:
  • Never use a public Wi-Fi network.
  • Never autosave any information, including passwords, credit card numbers, and personal data.
  • Use a password to protect all networks and accounts.
  • Only download files and apps from known, verified locations.
  • Don't open attachments from unknown senders.
  • Verify that all apps or programs are safe to install before proceeding.
  • Be aware that leaving your location services feature on can potentially share your location with unintended parties.
  • Use the most sophisticated forms of encryption for your website and email accounts.
If you are a business owner, the right business insurance can help soften the blow and lower the impact a security breach may have on your company. Selective offers our businesses more than just insurance. With additional services to help prevent and respond to data breaches and cyber events, businesses can reduce their risk. If your business is affected, Selective offers CyCurity® cyber liability insurance to mitigate loss and help your business recover. Contact your local Selective agent to learn more. Don’t have a Selective agent? Find an independent agent today.  ​

Related Articles

Paperless processes have become standard practice for businesses across numerous industries, but how many people are adopting paperless techniques in their daily lives?
DON'T UNDERESTIMATE THE POWER OF GOING PAPERLESS
 If you want to protect your investment in electronics – and the information contained within – consider a surge protector. It can be an inexpensive way to keep your property safe.
​CAN SURGE PROTECTORS SAVE YOUR ELECTRONICS?
Businesses of all sizes are at risk of a cybersecurity breach.
PROTECTING YOUR BUSINESS FROM CYBERSECURITY BREACHES


Comments are closed.

    Categories

    All
    Auto
    Business
    Flood
    Home

Picture
© 2020 Selective Insurance Group, Inc.
User Agreement
​Community Guidelines
​
AdChoices
CCPA Request 
Privacy
Contact
Visit our main web site at: selective.com or follow us:

© 2020 Selective Ins. Group, Inc., Branchville, NJ. Products vary by jurisdiction, terms, and conditions and are provided by Selective Ins. Co. of America and its insurer affiliates.
Details at selective.com/about/affiliated-insurers.aspx
Picture
Picture
  • Business
  • Auto
  • Home
  • Digital Toolbox
    • LinkedIn Best Practices
  • Flood
    • Hurricane Preparedness
  • Infographics
  • Prep Guides
    • Coronavirus Information
    • Spring Maintenance Guide
    • Fire Prevention & Safety
    • Winter Preparation For Your Home
    • Winter Preparation For Your Business
    • Winter Preparation For Your Vehicle
    • Hurricane Preparation